We’ve gone from a remote workforce to “work from anywhere.” How does this create new security challenges regarding the broad and unrestricted accessing of cloud apps? Sasi Murthy of Netskope discusses the path to zero trust data protection.
Application security today needs to “shift left” into the realm of the developer and be just as automated, iterative, and fast as the development process. Yet most developers don’t have the training or tools needed to prevent and remediate security flaws, and most security teams don’t have the bandwidth to...
Current figures from the GDPR Enforcement Tracker show that numerous penalties continue to be incurred by organisations, with many proving that compliance and data security still represent a major challenge for companies.
So what can organisations - both large and small - do now if they still have difficulties with...
With digital transformation come new applications and efficiencies in the cloud. But governance, visibility and access challenges also emerge. Hironori Yamashita of Imperva shares strategies for improving data governance and security in the cloud.
Organizations in the APAC region are not immune to the impact of the SolarWinds supply chain hack, so it's essential that they reassess their risk management practices and audit their suppliers, two security experts stress.
As users and applications become the risk focal point, there is no hard and fast perimeter security professionals can put a wall around. Consequently, application layers remain insufficiently secured. In fact, application layer attacks are now the most frequent pattern in confirmed breaches.
Download this guide and...
Large enterprises are migrating to the cloud in a phased manner. Enterprises are opting for a hybrid model, a mix of on-premise and cloud, preferably operating in a multi-cloud scenario. Besides, migrating the critical applications to the cloud also demands new considerations to enhance application security.
Some...
When it comes to finance, mobile banking or payments apps, maintaining customer trust is crucial to protecting brand equity and revenue. Cloud technology has eliminated the traditional network perimeter, leaving unsecured mobile endpoints vulnerable to attack. According to recent analyst research, mobile finance apps...
He's commanded armed forces, directed the National Security Agency, and now he is president of vendor IronNet Cybersecurity. From this unique perspective, retired General Keith Alexander says the SolarWinds breach is "a call for action."
In the wake of the SolarWinds breach, NIST's Ron Ross has turned his attention to systems security engineering - and the reality that the adversaries are exploiting it to their advantage better than the defenders are. This disparity, Ross says, has to change.
The working life of a software security professional is many things: challenging, exciting, unpredictable... but rarely is it easy. And in most organizations, they can be siloed, working separately from operations teams and the developers tasked with creating new applications. It can make for a rather chilly reception...
Cybersecurity is often seen by fast-moving organisations as an expensive obstacle to innovation. The drive to keep up with the unrelenting pace of business can mean that secure coding is pushed to the backburner, with security managers stressed and stretched across too many developers. In addition, most of the budget...
DevSecOps applies application security testing during the CI stage to put "Sec" into DevOps, so to speak. Security tools must provide meaningful, actionable results in return.
In this presentation, I'll explain why development teams are increasingly turning to source code management (SCM) platforms to achieve their...
When software is everywhere, everything becomes an attack surface. The root cause of many successful cyberattacks lies primarily in vulnerable software itself. The real question that needs to be asked is, "Can the industry do a better job of writing more-secure code, making software applications nearly impenetrable to...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.asia, you agree to our use of cookies.